Lucene search

K
cve[email protected]CVE-2023-50729
HistoryJan 15, 2024 - 4:15 p.m.

CVE-2023-50729

2024-01-1516:15:11
CWE-434
web.nvd.nist.gov
16
traccar
gps tracking system
vulnerability
file upload
arbitrary code
nvd
cve-2023-50729

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

Traccar is an open source GPS tracking system. Prior to 5.11, Traccar is affected by an unrestricted file upload vulnerability in File feature allows attackers to execute arbitrary code on the server. This vulnerability is more prevalent because Traccar is recommended to run web servers as root user. It is also more dangerous because it can write or overwrite files in arbitrary locations. Version 5.11 was published to fix this vulnerability.

Affected configurations

Vulners
NVD
Node
traccartraccarRange<5.11
VendorProductVersionCPE
traccartraccar*cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "traccar",
    "product": "traccar",
    "versions": [
      {
        "version": "< 5.11",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

Related for CVE-2023-50729